
In December 2020, security teams at FireEye noticed something strange: authenticated access to customer environments from infrastructure they didn't recognize. The attackers hadn't stolen passwords. They hadn't bypassed MFA. They had forged SAML tokens that looked identical to legitimate ones. The technique, now known as Golden SAML, meant attackers could authenticate as anyone, to any application, without ever touching the identity provider's authentication flow. SSO had become the attack vector.
Single sign-on systems serve as the master key to enterprise applications. When implemented correctly, SSO streamlines access, strengthens security posture, and simplifies identity management. But this centralization creates a paradox: the same mechanism that protects dozens of applications becomes the single point of failure that, when compromised, grants attackers access to everything behind it.
SSO bypass refers to techniques that allow attackers to circumvent single sign-on authentication mechanisms and gain unauthorized access to protected applications. Unlike credential theft or brute-force attacks, SSO bypass exploits weaknesses in the authentication protocol itself, the trust relationships between identity providers and service providers, or implementation flaws in how applications validate authentication assertions.
Attackers focus on SSO for one compelling reason: efficiency. A single successful bypass grants access to every application connected to that identity provider. Instead of compromising ten different applications individually, attackers compromise the authentication mechanism once and inherit access to everything.
The mathematics of SSO bypass are brutal. Organizations typically connect 15-50 applications to their SSO provider. One forged SAML token means one attack yields access to all of them. This force multiplication makes SSO bypass attacks particularly attractive to sophisticated threat actors conducting lateral movement campaigns.
SSO creates a fundamental security paradox. Centralizing authentication strengthens security by enforcing consistent policies, enabling MFA, and providing unified logging. But this same centralization concentrates risk. When the central authentication mechanism fails, everything behind it becomes accessible simultaneously.
Most organizations accept this trade-off because the security benefits outweigh the concentrated risk-assuming the SSO implementation is secure. The problem emerges when organizations implement SSO without understanding the attack surface they've created or the behavioral detection capabilities needed to identify compromised sessions.
Understanding SSO bypass requires understanding the trust chain that attackers exploit. Modern SSO implementations typically use SAML, OAuth, or OpenID Connect protocols. Each creates specific attack surfaces.
In a SAML implementation:
Attackers can exploit vulnerabilities at every step of this flow. The signature validation in step 7 represents the critical security control-if attackers can bypass it, forge it, or trick the SP into accepting an invalid assertion, authentication fails completely.
OAuth and OpenID Connect implementations create different attack surfaces. Instead of SAML assertions, these protocols use access tokens and refresh tokens. The trust relationship depends on:
As detailed in our analysis of OAuth token abuse, attackers increasingly target these tokens because they function as bearer tokens-whoever possesses the token can use it, regardless of how they obtained it.
SSO vulnerabilities typically emerge in three areas:
Golden SAML represents the most devastating SSO bypass technique. Attackers who obtain the SAML signing certificate from the identity provider can forge SAML assertions for any user, to any application, with any permissions-and these forged assertions are cryptographically indistinguishable from legitimate ones.
The attack requires three steps:
The SolarWinds attack demonstrated this technique at scale. After compromising networks through the supply chain breach, attackers extracted SAML signing certificates from on-premises Active Directory Federation Services (ADFS) servers. They then forged tokens to access Microsoft 365, Azure AD, and other cloud applications without ever authenticating through the actual identity provider.
Golden SAML attacks produce zero authentication events at the identity provider. The IdP never sees the forged authentication because the attacker bypassed it entirely. Traditional security monitoring focused on failed logins, impossible travel, or MFA failures detects nothing. The authentication appears completely legitimate to the service provider.
Detecting Golden SAML requires focusing on what happens after authentication, not the authentication event itself. Behavioral detection identifies:
SAML signature bypass exploits improper signature validation in service providers. Instead of forging the signature (which requires the private key), attackers manipulate the SAML assertion in ways that cause the service provider to skip validation or validate the wrong content.
CVE-2025-47949 in the Samlify library demonstrated this attack class. The vulnerability allowed attackers to bypass signature validation entirely through carefully crafted SAML assertions. Applications using vulnerable versions of Samlify accepted unsigned or improperly signed assertions as valid.
CVE-2024-45409 in ruby-saml exploited parser differential attacks. The XML parser used for signature validation processed the assertion differently than the parser extracting user attributes. Attackers crafted assertions that validated correctly but contained different identity information than what the application ultimately processed.
Service providers frequently make these signature validation errors:
XML signature wrapping attacks manipulate the structure of SAML assertions to trick service providers into validating one piece of content while processing a different piece for authentication decisions.
SAML assertions are XML documents with digital signatures. The signature covers specific elements of the document. Attackers can:
The service provider validates the signature successfully (because the signed content is legitimate) but processes the attacker's injected content for authentication.
Security researchers have documented dozens of XML signature wrapping variants. Each exploits subtle differences in how XML parsers handle:
Token replay attacks capture valid authentication tokens and reuse them within their validity window. Unlike forgery attacks, replayed tokens are completely legitimate-they were issued by the identity provider and are cryptographically valid.
Attackers obtain tokens through:
Our detailed analysis of pass-the-cookie attacks demonstrates how attackers steal and replay session tokens to bypass MFA entirely.
Preventing token replay requires:
Many applications maintain "emergency" local authentication mechanisms alongside SSO. These fallbacks, intended for break-glass scenarios when SSO is unavailable, often become permanent backdoors that bypass SSO entirely.
Organizations create local authentication through:
Attackers discover these fallbacks through:
Security teams must:
Attacking the identity provider directly represents the most straightforward SSO bypass: if you control the IdP, you can issue legitimate tokens for any user.
IdP compromise occurs through:
The MGM breach (2023) demonstrated help desk social engineering. Attackers called Okta support, impersonated an IT administrator, and convinced support to reset credentials, granting administrative access to the entire identity infrastructure.
IdP compromise creates cascading failures across the entire application ecosystem. With administrative access, attackers can:
SSO misconfigurations create authentication bypasses without requiring exploitation of vulnerabilities. Common misconfigurations include:
Organizations frequently configure "trusted" IP ranges that bypass authentication requirements. Attackers who gain access to these networks (through VPN compromise, network intrusion, or cloud resource compromise) inherit the trust exemption.
Service providers sometimes fail to validate critical SAML assertion attributes:
Many SaaS applications support legacy protocols (IMAP, POP3, SMTP) that predate SSO implementation. These protocols often accept basic authentication, creating a complete SSO bypass for attackers with credentials.
SSO session cookies scoped to parent domains create vulnerabilities when organizations abandon subdomains without properly decommissioning them.
This attack requires no SSO vulnerability-just improper cookie scoping and abandoned infrastructure.
SSO's fundamental architecture creates concentrated risk. Every application trusts the SSO assertion without performing independent authentication. This trust model means:
Traditional multi-factor authentication at the application level provided defense in depth. Even if attackers compromised one application's credentials, they still needed to compromise each additional application independently. SSO eliminates this isolation.
SSO creates a transitive trust relationship:
Attackers exploit this chain by attacking the weakest link. Forged SAML assertions bypass all three trust layers simultaneously. The service provider receives a cryptographically valid assertion and has no mechanism to verify the user actually authenticated.
Not all applications in an organization use SSO. Shadow IT deployments, legacy systems, and applications deployed before SSO implementation often maintain independent authentication. These create:
Understanding how attackers target SaaS identities requires recognizing these gaps in SSO coverage.
1. Implement Phishing-Resistant Authentication
Traditional MFA (SMS codes, authenticator apps) remains vulnerable to phishing and session hijacking. Organizations should deploy:
2. Monitor Post-Authentication Behavior
SSO bypass attacks often produce valid authentication events. Detection requires analyzing behavior after authentication:
3. Audit All Authentication Paths
Security teams must inventory every way users can authenticate to each application:
Each non-SSO path represents a potential bypass that requires monitoring or elimination.
4. Regular Security Assessments
IdP configuration requires regular security reviews:
5. Enforce SSO Universally
Eliminate authentication gaps by:
1. Properly Validate SAML Signatures
Use well-tested SAML libraries and ensure:
2. Implement Token Replay Prevention
OAuth and OIDC implementations must:
3. Strict Validation Requirements
Service providers must validate all SAML assertion attributes:
4. Secure Session Management
After SSO authentication succeeds:
5. Remove Local Authentication
Eliminate or heavily restrict local authentication mechanisms:
Golden SAML doesn't generate IdP authentication logs. Signature bypass looks like normal authentication at the service provider. Traditional security monitoring focused on failed logins, impossible travel, or MFA bypass alerts detects nothing because the authentication appears completely legitimate.
SSO bypass attacks reveal themselves through post-authentication behavior:
User "authenticated" but behavior doesn't match their pattern
Access to applications the user has never used before
Session from geography inconsistent with user's history
Lateral movement patterns after SSO authentication
OAuth apps authorized immediately after SSO session established
Golden SAML attacks produce no traditional indicators of compromise:
No failed logins to detect
No MFA bypass to alert on
No credential stuffing patterns
No brute force attempts
Token is cryptographically valid
Only behavioral anomalies reveal the attacker
This is why Identity Threat Detection and Response (ITDR) capabilities focus on behavioral analysis rather than authentication event monitoring. The authentication succeeds. The token validates correctly. Only the user's behavior after authentication reveals the compromise.
CVE Product Impact Year Exploitation Status CVE-2025-47949 Samlify Auth bypass via signature wrapping 2025 Proof of concept CVE-2025-59718 Fortinet FortiOS SSO bypass via SAML forgery 2025 Active exploitation CVE-2025-59719 Fortinet Products SSO authentication bypass 2025 Active exploitation CVE-2024-45409 ruby-saml Auth bypass via parser differential 2024 Proof of concept
The Fortinet vulnerabilities demonstrate the severity of SSO bypass attacks in 2026. CVE-2025-59718 and CVE-2025-59719 allowed attackers to bypass FortiCloud SSO authentication and gain unauthorized access to FortiGate firewalls, FortiManager, FortiAnalyzer, and other security appliances.
Arctic Wolf identified coordinated attacks beginning January 15, 2026, involving:
These attacks succeeded against fully updated devices that had already been patched for previous vulnerabilities, demonstrating how new attack paths continue to emerge even in patched systems.
SSO bypass attacks become exponentially more dangerous in interconnected SaaS environments. Modern organizations don't just use individual SaaS applications-they connect them through OAuth integrations, API keys, and service accounts that create a SaaS supply chain.
When attackers bypass SSO to access one application, they inherit access to every application connected through OAuth tokens and API integrations:
The attacker rides these trusted connections straight into customer environments, multiplying the blast radius of a single SSO bypass. As documented in the Stellantis breach, one compromised integration can extend into dozens of downstream applications.
This creates a critical misconception: OAuth refresh tokens continue functioning even after SSO sessions expire. Organizations believe SSO provides centralized control, but OAuth tokens operate in a hidden layer beyond SSO visibility.
When an attacker bypasses SSO and authorizes an OAuth app:
Understanding OAuth token abuse reveals how SSO bypass attacks establish persistent access that survives even after the initial breach is discovered.
SSO bypass attacks circumvent the authentication mechanisms organizations depend on to protect their entire application ecosystem. Unlike credential theft or brute-force attacks, SSO bypass techniques exploit the authentication protocol itself, creating valid sessions that traditional security controls cannot distinguish from legitimate access.
The eight attack techniques detailed in this analysis-from Golden SAML forgery to subdomain takeover-demonstrate that SSO creates a concentrated attack surface. When attackers bypass SSO, they bypass everything: MFA, conditional access policies, authentication logging, and application-level security controls.
Immediate priorities:
Start in minutes and secure your critical SaaS applications with continuous monitoring and data-driven insights.